A game theoretic framework for evaluation of the impacts of hackers diversity on security measures

被引:11
|
作者
Moayedi, Behzad Zare [1 ]
Azgomi, Mohammad Abdollahi [1 ]
机构
[1] Iran Univ Sci & Technol, Sch Comp Engn, Tehran 1684613114, Iran
关键词
Security; Modelling; Quantitative security evaluation; Markov chains; Game theory; SYSTEMS; STRATEGY; DEFENSE; SERIES;
D O I
10.1016/j.ress.2011.11.001
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Game theoretical methods offer new insights into quantitative evaluation of dependability and security. Currently, there is a wide range of useful game theoretic approaches to model the behaviour of intelligent agents. However, it is necessary to revise these approaches if there is a community of hackers with significant diversity in their behaviours. In this paper, we introduce a novel approach to extend the basic ideas of applying game theory in stochastic modelling. The proposed method classifies the community of hackers based on two main criteria used widely in hacker classifications, which are motivation and skill. We use Markov chains to model the system and compute the transition rates between the states based on the preferences and the skill distributions of hacker classes. The resulting Markov chains can be solved to obtain the desired security measures. We also present the results of an illustrative example using the proposed approach, which examines the relation between the attributes of the community of hackers and the security measures. (C) 2011 Elsevier Ltd. All rights reserved.
引用
收藏
页码:45 / 54
页数:10
相关论文
共 50 条
  • [1] A Game Theoretic Approach for Quantitative Evaluation of Security by Considering Hackers with Diverse Behaviors
    Moayedi, Behzad Zare
    Azgomi, Mohammad Abdollahi
    [J]. EIGHTH IEEE INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, PROCEEDINGS, 2009, : 508 - 513
  • [2] Diversity and System Security: A Game Theoretic Perspective
    Brahma, Swastik
    Kwiat, Kevin
    Varshney, Pramod K.
    Kamhoua, Charles
    [J]. 2014 IEEE MILITARY COMMUNICATIONS CONFERENCE: AFFORDABLE MISSION SUCCESS: MEETING THE CHALLENGE (MILCOM 2014), 2014, : 146 - 151
  • [3] Game Theoretic Security Framework for Quantum Key Distribution
    Krawec, Walter O.
    Miao, Fei
    [J]. DECISION AND GAME THEORY FOR SECURITY, GAMESEC 2018, 2018, 11199 : 38 - 58
  • [4] Quantifying the Security of Physical Facilities: A Game Theoretic Framework
    Singh, Rajdeep
    Ariyur, Kartik B.
    [J]. 2012 50TH ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING (ALLERTON), 2012, : 1368 - 1373
  • [5] A game-theoretic framework for the security system of visible watermarking
    Tsai, Min-Jen
    Liu, Jung
    Wang, Chen-Sheng
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2011, 38 (05) : 5748 - 5754
  • [6] SPECTRE: A Game Theoretic Framework for Preventing Collusion in Security Games
    Gholami, Shahrzad
    Wilder, Bryan
    Brown, Matthew
    Sinha, Arunesh
    Sintov, Nicole
    Tambe, Milind
    [J]. AAMAS'16: PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON AUTONOMOUS AGENTS & MULTIAGENT SYSTEMS, 2016, : 1498 - 1500
  • [7] A Security Enforcement Framework for SDN Controller Using Game Theoretic Approach
    Priyadarsini, Madhukrishna
    Bera, Padmalochan
    Das, Sajal K.
    Rahman, Mohammad Ashiqur
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (02) : 1500 - 1515
  • [8] A game-theoretic approach to stochastic security and dependability evaluation
    Sallhammar, Karin
    Helvik, Bjarne E.
    Knapskog, Sven J.
    [J]. DASC 2006: 2ND IEEE INTERNATIONAL SYMPOSIUM ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, PROCEEDINGS, 2006, : 61 - +
  • [9] A Game Theoretic Framework for Modeling Adversarial Cyber Security Game Among Attackers, Defenders, and Users
    Ryutov, Tatyana
    Orosz, Michael
    Blythe, James
    von Winterfeldt, Detlof
    [J]. SECURITY AND TRUST MANAGEMENT (STM 2015), 2015, 9331 : 274 - 282
  • [10] On Measures of Information Theoretic Security
    Liu, Shuiyin
    Hong, Yi
    Viterbo, Emanuele
    [J]. 2014 IEEE INFORMATION THEORY WORKSHOP (ITW), 2014, : 309 - 310